期刊文献+

应用于安全处理器的RSA/SHA复用加密单元设计 被引量:2

Unified Crypto Architecture Accelerating RSA/SHA for Security Processor
下载PDF
导出
摘要 提出了一种加速RSA和SHA算法的复用硬件架构设计方法,通过在RISC处理器中集成一种RSA/SHA复用加密单元来取得高效的密码运算能力.以一种使用该加密单元的安全处理器来验证该方案的有效性,结果表明密钥长度为1 024位的RSA算法执行时间为190 ms,SHA-1的吞吐率达到64 Mb/s.本方案采用SMIC0.18μm标准CMOS工艺进行了逻辑综合,RSA/SHA复用加密单元的最高时钟频率可达到196 MHz,核心电路面积约为2600个等效与非门. This paper proposes a unified hardware architecture which can accelerate both RSA and SHA-1 calculations. And a scalable and unified crypto function unit is presented to support high performance cryptographic computation in the RISC-like processor. To evaluate the effectiveness of our solution, a crypto-processor is employed to integrate the proposed function unit, and the execution time of 1 024 bit RSA is 190 ms and SHA-1 encryption rate reaches 64 Mbps. According to the synthesis results based on SMIC 0.18 micron library, the unified crypto function unit can achieve 196 MHz work frequency with the utilization of 2.6 thousand gates.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2008年第5期615-618,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(60576024 60776028)
关键词 RSA算法 安全散列算法 RSA/SHA复用加密单元 RISC处理器 RSA (Rivest-Shamir-Adleman) algorithm SHA (secure Hash algorithm) algorithm unified RSA/SHA crypto function unit RISC (reduced instruction set computer) processor
  • 相关文献

参考文献11

  • 1Stallings W. Cryptography and Network Security: Principles and Practice[M]. 2nd Edition. New Jersey: Prentice Hall, 2002. 被引量:1
  • 2韩军,曾晓洋,陆荣华,赵佳,汤庭鳌.集成模乘求逆双重运算的抗攻击RSA协处理器[J].小型微型计算机系统,2007,28(4):753-758. 被引量:2
  • 3Lu R, Zeng X, Han J. Design and VLSI Implementation of a Security ASIP[C]//7th International Conference on ASIC. Guilin:IEEE Press,2007:866 869. 被引量:1
  • 4Michail H,Kakarountas A P,Koufopavlou O. A LowPower and High-Throughput Implementation of the SHA-1 Hash function [C]//Circuits and Systems. Ko- be,Japan: IEEE Press,2005:4086-4089. 被引量:1
  • 5顾叶华,曾晓洋,韩军,张章.低硬件成本的高性能Hash算法加速器VLSI设计[J].小型微型计算机系统,2007,28(5):940-943. 被引量:2
  • 6ARM Limited. ARM SecureCore Solution [ EB/OL]. [2007-09-10 ]. http://www, arm. com/aboutarm/ 4 XAFLB/$ File / SecureCores. pdf. 被引量:1
  • 7MIPS Technologies Inc. SmartMIPS Architecture Smart Card Extensions [EB/OL]. [ 2007-08-01 ]. ht tp://www, rnips, com/ProductCatalog/PSmartMIP- SSASE/SmartMIPS. pd f. 被引量:1
  • 8NEC Electronics Inc. V-WAY32 32-Bit Security Cryptocontroller [EB/OL]. [2007-09-05]. http://www. nec. com. sg/es/Smartcard, htm. 被引量:1
  • 9STMicroelectronics. ST22 SmartJ Platform Smartcard ICs[EB/OL]. [2008-01-17]. http://www. st. com/ stongine/ prodpres/smartcard/ insc9901, htm. 被引量:1
  • 10Kim H W, Lee S. Design and Implementation of a Pri vate Key Crypto Processor and Its Application to a Se curity System[J].IEEE Transaction on Consumer E lectronics, 2004,50( 1 ) : 214-224. 被引量:1

二级参考文献19

  • 1Rivest R L,Shamir A,Adleman L A.Method for obtaining digital signartres and pubic-dey cryptosystems[J].Communications of the ACM,1978,21(2):120-126. 被引量:1
  • 2Kocher P,Jaffe J,Jun B.Differential power analysis[C].In:Proceeding of Advances in Cryptography (CRYPTO'99),Santa Barbara,USA,1999,388-397. 被引量:1
  • 3Tomas S Messerges,Ezzy A Dabbish,Robert H Sloan.Power analysis attacks of modular exponentiation in smartcards[C].In:Proceeding of Workshop on Cryptographic Hardware and Embedded SySetms (CHES'99),Worcester,USA,1999,144-157. 被引量:1
  • 4Arno S,Wheeler F S.Signed digit representations of minimal Hamming weight[J].IEEE Transactions on Computers,1993,C-42(8):1007-1010. 被引量:1
  • 5Montgomery P L.Modular multiplication withour trial division[J].Mathematics of Computation,1985,44(170):519-521. 被引量:1
  • 6Gutub A A A,Tenca A F.Efficient scalable hardware architecture for montgomery inverse computation in GP(P)[C].In:Procceeding of IEEE Workshop on Signal Processing Systems (SIPS),Seoul,Korea,2003,93-98. 被引量:1
  • 7Marc.Joye,Sung-Ming Yen.Optimal left-to-right binary signed-digit recoding[J].IEEE Transactions on Computer,2000,49[7]:740-748. 被引量:1
  • 8Kwon Taek-Won.Two Implementation Methods of a 1024-bit RSA crypto-processor based on modified Montgomery algorithm[J].The 2001 IEEE International Symposium on Circuits and Systems (ISCAS 2001),Sydney Australia,2001,4:650-653. 被引量:1
  • 9Liu Qiang,Ma Fang-zhen,Tong Dong-tong et al.A regular parallel RSA processor[C].The 2004 47 th Midwest Symposium on Circuits and Systems (MWSCAS'04),Hiroshima,Japan,2004:467-470. 被引量:1
  • 10Soner Yesil.Two fast RSA implementations using high-radix montgomery algorithm[J].The IEEE Interntional Symposium on Circuits and Systems (ISCAS 2004),Vancouver,Canada,2004:557-560. 被引量:1

共引文献2

同被引文献25

  • 1章登义,毛从武,李永忠.AES算法及其在DSP中优化实现[J].计算机工程与科学,2005,27(9):7-9. 被引量:4
  • 2唐明,张焕国,刘树波,赵波.AES的高性能硬件设计与研究[J].计算机工程,2006,32(8):257-259. 被引量:4
  • 3高娜娜,李占才,王沁.一种可重构体系结构用于高速实现DES、3DES和AES[J].电子学报,2006,34(8):1386-1390. 被引量:19
  • 4顾叶华,曾晓洋,韩军,张章.低硬件成本的高性能Hash算法加速器VLSI设计[J].小型微型计算机系统,2007,28(5):940-943. 被引量:2
  • 5Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks: a survey[J]. Computer Networks, 2002, 38(7):393-422. 被引量:1
  • 6Stallings W.密码编码学与网络安全[M].4版.孟庆树,傅建明,译.北京:电子工业出版社,2006. 被引量:1
  • 7National Institute of Standards and Technology. Federal Information Processing Standards (FIPS) Publication 180-1 Secure Hash Standard (SHA-1) [S].Washington: NIST, 1995. 被引量:1
  • 8Michail H, Kakarountas A P, Koufopavlou O. A low-power and high-throughput implementation of the SHA-1 Hash function[C]//IEEE International Symposium on Circuits and Systems. Kobe: IEEE, 2005:4 086-4 089. 被引量:1
  • 9Kaps J P, Sunar B. Energy comparison of AES and SHA-1 for ubiquitous computing[C]//2nd IFIP International Symposium on Network Centric Ubiquitous Systems. Berlin.. Springer, 2006: 372-381. 被引量:1
  • 10Lee Y K, Chan H, Verbauwhede I. Throughput optimized SHA-1 architecture using unfolding transformation[C]//IEEE 17th International Conference on Application-specific Systems, Architectures and Processors. Steamboat Springs, Colorado: IEEE, 2006: 354-359. 被引量:1

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部